Skip to main content

How to make sure no one is spying on your computer

[ad_1]


A program that spies on your computer activity is one of the most dangerous forms of malware. It won't present you with a ransomware request or announce it's deleting your files. Instead, it hides silently on your system, watching and recording all your computer activity.



Spyware can do everything from hijacking your webcam feed to recording your keyboard inputs. The culprits ultimately aim to collect enough of your personal data to steal your identity, take over your accounts, or expose your digital life in other ways. To minimize the odds of an unwanted program taking root on your machine, follow our guide to staying spyware-free.


Secure your system



To start with, you need to establish solid protection for your computer. Most antivirus programs for both Windows and macOS will protect against keyloggers, webcam hackers, and other types of spyware, especially if you vigilantly keep this software up to date.



How do you choose? You won't find a "one size fits all" security solution for everyone. For most home computers, free software should provide adequate level of protection, but paying for an upgraded version of the program will increase your chances of staying safe.



We chose four of the most effective and intuitive free antivirus tools we've used in recent years. They all receive high scores from AV-Comparatives, an organization that independently assesses antivirus software, even compared to excellent fee-based programs like Avira and McAfee. Although none of the following options specializes in fighting spyware, all of them include some defenses against that type of malicious program. As long as you install any one of these packages, you'll massively reduce your system's risk of infection.



Our picks are Windows Defender (included with Windows 10), AVG Free (for Windows and macOS, upgraded version costs $70/year), Bitdefender (for Windows, upgraded version includes macOS support and costs $54/year), Malwarebytes (for Windows, upgraded version includes macOS support and costs $40/year), and Avast (for Windows and macOS, upgraded version costs $60/year). If you upgrade these programs to paid-for versions, you'll gain extras like enhanced web-link scanning to catch dodgy URLs, more comprehensive options for proactively preventing attacks, and secure file storage.



Alongside your main security product, we recommend that you install secondary protection. For Windows, we like the free Spybot Search & Destroy, which works alongside your regular antivirus package, performing deep scans as an extra layer of defense against infectious code. If you suspect that your computer suffers from spyware, but your normal antivirus tool doesn't pick it up, try digging deeper into your system with the secondary Windows security program Norton Power Eraser. In a similar vein, Trend Micro's HouseCall serves as an extra scanner on top of your current security package, and it works from your web browser, which allows it to cover any type of operating system.


Avoid infection



Even with a strong antivirus program in place, you don't want to give spyware a chance to hitch a ride on your computer. If you want to keep prying eyes off your system, then you need to monitor all the potential ways malicious code can worm its way into your machine.



Sadly, some spyware enters through the household, when people attempt to pry into the computer behavior of their friends and family members. While we're sure everyone in your home is perfectly trustworthy...a shared computer should still have separate user accounts for each person who relies on that machine. Protect those accounts with passwords to keep out snoops: In Windows, do this in Settings > Accounts; in macOS, check the setting in System Preferences > Users & Groups.



Other programs arrive in disguise, purporting to be random web pop-ups or harmless email messages. They often hide within applications that look perfectly legit, or appear to be email attachments in a file format you recognize. Be wary of links you receive over social media or email, even if they appear to come from people you trust—a bad actor may have compromised their accounts or spoofed their identities. Here are a few ways to protect yourself from fraudulent links, which may contain spyware.



In addition, you need to be very careful about what you install on your computer, and where you download it from. If you want to try a new piece of software, make sure to read up on it first. And when you're ready to install the program, make sure you get it from the official website of the software company that designs it, or stick to programs that you can download from the Mac or Windows Store. The same goes for browser extensions. Giving these tools access to your browser can compromise its security, so you need to vet add-ons carefully. Before you install anything, check the reviews left by other users, or search for it to see if it has endorsements from professional tech sites.


Know the warning signs



No matter how tight you make your system's defenses, you shouldn't get complacent. In addition to taking the aforementioned precautions against infection, keep an eye out for these signs of spyware's presence.



One red flag is a system that runs sluggishly. Of course, older computers slow down gradually over time, but watch for a sudden drop in performance. Also keep an eye out for a lot of hard drive activity and software pauses, especially if they happen even when your computer is not running a lot of programs.



In general, you should treat strange and unexpected behavior—such as the launch of applications that you didn't open directly—with suspicion. This is no big deal if you've set programs to open automatically when the computer turns on, but it could be problematic if this happens when you're in the middle of a session. It's particularly suspect if windows appear briefly and then disappear again, a sign of a program loading and then hiding itself.



Every spyware program and system setup is different, so we can't really give you a definitive checklist; but the more suspicious occurrences you notice, the more likely it is that your computer has been infected. Other odd actions include unexplained mouse movements or text input, which might be a sign of something unknown working in the background; changes to the settings of the operating system; and the appearance of application shortcuts that you haven't noticed before.



Spyware will try to run invisibly, but it will still use up memory and CPU time. So you should check what programs and processes are running on your computer. On a Windows machine, you can use Task Manager, which you launch by searching for it in the taskbar box. Then switch to the Processes tab to see all the applications and processes currently in memory. On macOS, take advantage of a similar tool called Activity Monitor, which you can find by opening Spotlight (hit the Cmd+Space keyboard shortcut) and searching for Activity Monitor. Under the CPU tab you'll see a list of programs and processes currently running, as well as how much of your computer's system resources they're taking up.



What should you look for in Task Manager or Activity Monitor? Annoyingly, malicious tools frequently have names that look as innocuous as possible. This means we can't give you a definitive list of terms that indicate spyware. Instead, keep an eye out for applications or processes that you don't recognize or remember launching, then do a quick web search for their names to find out if they're legitimate or not.


The good news is that even as spyware becomes smarter and more sophisticated, browsers and operating systems are including more security tools. Still, you should always keep your system, its programs, and its security tools up to date with the latest patches.




[ad_2]

Written By David Nield

Comments

Popular posts from this blog

Ice technicians are the secret stars of the Winter Olympics

[ad_1] The emphasis of this year's two-week-long Winter Olympic Games has been placed squarely on the Olympians themselves. After all, the stated purpose of the international competition is to bring together the world’s greatest athletes in a nail-biting competition across fifteen different winter sports. But before the curlers, skiers, and skaters even arrived in Pyeongchang, South Korea, the Olympians of the ice technician world were already a few weeks deep in a competition of their own. Mark Callan of the World Curling Federation and Markus Aschauer of the International Bobsleigh and Skeleton Federation both say they’re hoping to make the best ice the Winter Olympics have ever seen. To transform the barren concrete jungle of existing tracks and arenas into an ice- and snow-covered wonderland is an enormous undertaking. And it takes a keen understanding of the physics and chemistry that keeps frozen precipitation pristine. Curling Callan has been making and maintaining ic...

Humans flourished through a supervolcano eruption 74,000 years ago (so you can make it through Tuesday)

[ad_1] About 74,000 years ago, a large chunk of a Pacific island exploded. It sent ash and other debris around the world, including to the southern tip of Africa, where it would be found by a team of international scientists and entered as the latest data point in one of the hottest debates in paleoanthropology ( I know ): Did the Toba supervolcano thrust our planet into a 1,000-year volcanic winter, thus bottle-necking animals and plants alike? Or was it just a little blip on our historic radar? That’s the contentious arena into which our intrepid researchers venture, this time with a new study in Nature establishing that humans in modern-day South Africa not only survived, but flourished after the Toba eruption. Where once was (we think, maybe) a mountain, there is now a huge caldera with a lake inside, and an island inside that. Their evidence shows that debris from the explosion landed 9,000 kilometers (5592.3 miles) away, the farthest distance traveled ever recorded for the ...

These 1950s experiments showed us the trauma of parent-child separation. Now experts say they're too unethical to repeat—even on monkeys.

[ad_1] John Gluck’s excitement about studying parent-child separation quickly soured. He’d been thrilled to arrive at the University of Wisconsin at Madison in the late 1960s, his spot in the lab of renowned behavioral psychologist Harry Harlow secure. Harlow had cemented his legacy more than a decade earlier when his experiments showed the devastating effects of broken parent-child bonds in rhesus monkeys. As a graduate student researcher, Gluck would use Harlow’s monkey colony to study the impact of such disruption on intellectual ability. Gluck found academic success, and stayed in touch with Harlow long after graduation. His mentor even sent Gluck monkeys to use in his own laboratory. But in the three years Gluck spent with Harlow—and the subsequent three decades he spent as a leading animal researcher in his own right—his concern for the well-being of his former test subjects overshadowed his enthusiasm for animal research. Separating parent and child,...